Security
How clawd.run protects your data, isolates your agent, and earns your trust. Built on open-source. Auditable by design.
clawd.run is built on OpenClaw, an open-source agent framework. You should know exactly what runs on your behalf, where your data lives, and what guarantees you actually have.
Encryption
All connections use TLS 1.2+. API calls to AI providers, Stripe, and internal services are encrypted end-to-end. WebSocket connections to sandboxes use WSS.
All stored data is encrypted at rest using AES-256. Sandbox volumes use encrypted storage. Payment data is handled by a PCI DSS Level 1 certified processor.
Channel credentials use AES-256-GCM, keyed per-user. API keys are stored as HMAC hashes. Never plaintext, never logged, never sent anywhere unintended.
Isolation
Data access
Every collection has explicit security rules. Users can only read and write their own data. Admin-only collections are inaccessible from the client.
AI providers
When you send a message, it is forwarded to an AI provider. They receive:
Most major providers (Anthropic, OpenAI) do not train on API inputs by default. If you use BYOK, data is sent under your own API agreement.
Open source
clawd.run is built on OpenClaw. The framework's security model covers sandbox modes, tool policies, authentication, and threat model.
Report security issues to security@clawd.run. Do not open a public GitHub issue. We respond within 48 hours.